Bug 2237709 (CVE-2022-40433) - CVE-2022-40433 OpenJDK: segmentation fault in ciMethodBlocks
Summary: CVE-2022-40433 OpenJDK: segmentation fault in ciMethodBlocks
Keywords:
Status: NEW
Alias: CVE-2022-40433
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2237710
TreeView+ depends on / blocked
 
Reported: 2023-09-06 13:15 UTC by Vipul Nair
Modified: 2024-03-20 10:34 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in OpenJDK. This issue occurs in the ciMethodBlocks::make_block_at function in OpenJDK (HotSpot VM) 8 (11 and 17 are fixed starting from 11.0.17 and 17.0.5 respectively), and may allow an attacker to cause a denial of service.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:5725 0 None None None 2023-10-18 16:22:49 UTC
Red Hat Product Errata RHSA-2023:5727 0 None None None 2023-10-18 23:01:29 UTC
Red Hat Product Errata RHSA-2023:5728 0 None None None 2023-10-18 23:01:42 UTC
Red Hat Product Errata RHSA-2023:5729 0 None None None 2023-10-18 23:04:02 UTC
Red Hat Product Errata RHSA-2023:5730 0 None None None 2023-10-18 23:27:37 UTC
Red Hat Product Errata RHSA-2023:5731 0 None None None 2023-10-18 22:55:49 UTC
Red Hat Product Errata RHSA-2023:5732 0 None None None 2023-10-18 23:01:19 UTC
Red Hat Product Errata RHSA-2023:5733 0 None None None 2023-10-18 23:04:10 UTC

Description Vipul Nair 2023-09-06 13:15:49 UTC
An issue was discovered in function ciMethodBlocks::make_block_at in Oracle JDK (HotSpot VM) 11, 17 and OpenJDK (HotSpot VM) 8, 11, 17, allows attackers to cause a denial of service.

Comment 3 errata-xmlrpc 2023-10-18 16:22:48 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 8u392

Via RHSA-2023:5725 https://access.redhat.com/errata/RHSA-2023:5725

Comment 4 errata-xmlrpc 2023-10-18 22:55:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:5731 https://access.redhat.com/errata/RHSA-2023:5731

Comment 5 errata-xmlrpc 2023-10-18 23:01:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:5732 https://access.redhat.com/errata/RHSA-2023:5732

Comment 6 errata-xmlrpc 2023-10-18 23:01:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:5727 https://access.redhat.com/errata/RHSA-2023:5727

Comment 7 errata-xmlrpc 2023-10-18 23:01:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:5728 https://access.redhat.com/errata/RHSA-2023:5728

Comment 8 errata-xmlrpc 2023-10-18 23:04:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2023:5729 https://access.redhat.com/errata/RHSA-2023:5729

Comment 9 errata-xmlrpc 2023-10-18 23:04:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:5733 https://access.redhat.com/errata/RHSA-2023:5733

Comment 10 errata-xmlrpc 2023-10-18 23:27:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:5730 https://access.redhat.com/errata/RHSA-2023:5730


Note You need to log in before you can comment on or make changes to this bug.